SlideShare a Scribd company logo
Computer system security and
control
Information security is the protection of
computer systems and networks from theft or
damage to the hardware, software or electronic
data as well as from the disruption or
misdirection of the services they provide.
Objectives of information security
It focuses on three goals:
1. Confidentiality: preventing the disclosure of
information to unauthorized users.
2. Data integrity : ensuring the accuracy and
authenticity of data. Only authorized persons
may edit data and they need to follow
procedures to prevent former employees from
retaining the ability to alter company data
3. Availability: authorised users should have
reliable access to information when they need it
TYPES OF INFORMATION SECURITY
1. Application security
Involves protecting software applications by
preventing, detecting and fixing bugs and
vulnerabilities
2. Cloud security
Involves protections of data, applications and
infrastructures involved in cloud computing
3. Cryptography
Covers a lot of techniques for communicating
in a secure manner
4. Infrastructure security
Eg data centers, internal and external
networks, desktops
Reasons why computer systems are
vulnerable
Increased access to the system
Disgruntled/dishonest employees
Increased system complexity
Cyber terrorism/crime on the internet or
hackers
Complacent management
Modern networked systems
Natural disasters
Fire
Floods
Earthquakes, wind storms and rain
lightening
Accidental threats
Human errors
Procedural errors
Software errors
Electromechanical problems
International breaches of security
Theft
Terrorism
Computer viruses
Unauthorized disclosure or access,
modification or destruction or loss of data or
information
Computer fraud
General controls
Physical control
Access controls or logical controls eg
passwords, biometric identification techniques
Back up
Administrative controls
Types of Application controls
Input controls: are computer controls designed to
provide reasonable assurance that transactions are
properly authorized before processed by the
computer, incorrect transactions are rejected.
Processing controls: provide an automated means
to ensure processing is complete, accurate and
authorized.
Output controls: address what is done with data
and should compare output results with the
intended result by checking the output against the
input
Internet and E-commerce challenges
Viruses: Is a malicious piece of computer code
designed to spread from device to device. Viruses
are designed to damage a device or steal data
Hackers: A security hacker is someone who
explores methods for breaching defenses and
exploiting weaknesses in a computer system or
network
Spamming: The use of messaging systems to send
multiple unsolicited messages to large numbers of
recipients for the purpose of commercial
advertising or for any prohibited purpose
E-commerce controls
Firewall: firewall is a network security system
that monitors and controls incoming and outgoing
network traffic based on predetermined security
rules.
Encryption: is the process of encoding
information, that is the process converts the
original representation of the information known
as plain text into an alternative form known as
cipher text. Only authorized parties can decipher a
cipher text back to plaintext and access the
original information.
Digital signature: is a mathematical technique
used to validate the authenticity and integrity
of message ,software or digital document.
Digital signatures are based on public key
cryptography and private key cryptography
Authentication : uses password or any
biometric technique

More Related Content

Similar to Computer system security and control-2.pptx

Network security model.pptx
Network security model.pptxNetwork security model.pptx
Network security model.pptx
ssuserd24233
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
muskaangoel15
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
girmawodajo
 
Unit v
Unit vUnit v
Cyber Crime and Security
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security
Sanguine_Eva
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...
Rishav Gupta
 
It security
It securityIt security
It security
avi2607
 
edu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptxedu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptx
ANJUMOHANANU
 
Ethical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptxEthical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptx
Janani S
 
Computer security and
Computer security andComputer security and
Computer security and
Rana Usman Sattar
 
Cat21:Development Mangement Information Systems
Cat21:Development Mangement Information SystemsCat21:Development Mangement Information Systems
Cat21:Development Mangement Information Systems
Simeon Ogao
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
anjalee990
 
Network Security
Network SecurityNetwork Security
Network Security
Sayantan Sur
 
Security issue in e commerce
Security issue in e commerceSecurity issue in e commerce
Lect13 security
Lect13   securityLect13   security
Lect13 security
Umang Gupta
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
JoselitoJMebolos
 
Cybercrime and security.pptx
Cybercrime and security.pptxCybercrime and security.pptx
Cybercrime and security.pptx
KarthikShivanand
 
презентация1
презентация1презентация1
презентация1
sagidullaa01
 
IS Unit II.pptx
IS Unit II.pptxIS Unit II.pptx
IS Unit II.pptx
LAVANYAsrietacin
 
Cybersecurity from A to Z
Cybersecurity from A to ZCybersecurity from A to Z
Cybersecurity from A to Z
Telefónica Business Solutions
 

Similar to Computer system security and control-2.pptx (20)

Network security model.pptx
Network security model.pptxNetwork security model.pptx
Network security model.pptx
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
 
Unit v
Unit vUnit v
Unit v
 
Cyber Crime and Security
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...
 
It security
It securityIt security
It security
 
edu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptxedu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptx
 
Ethical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptxEthical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptx
 
Computer security and
Computer security andComputer security and
Computer security and
 
Cat21:Development Mangement Information Systems
Cat21:Development Mangement Information SystemsCat21:Development Mangement Information Systems
Cat21:Development Mangement Information Systems
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
 
Network Security
Network SecurityNetwork Security
Network Security
 
Security issue in e commerce
Security issue in e commerceSecurity issue in e commerce
Security issue in e commerce
 
Lect13 security
Lect13   securityLect13   security
Lect13 security
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Cybercrime and security.pptx
Cybercrime and security.pptxCybercrime and security.pptx
Cybercrime and security.pptx
 
презентация1
презентация1презентация1
презентация1
 
IS Unit II.pptx
IS Unit II.pptxIS Unit II.pptx
IS Unit II.pptx
 
Cybersecurity from A to Z
Cybersecurity from A to ZCybersecurity from A to Z
Cybersecurity from A to Z
 

More from DaveN31

Digital signature.pptx
Digital signature.pptxDigital signature.pptx
Digital signature.pptx
DaveN31
 
Commercial credit and its types.pptx
Commercial credit and its types.pptxCommercial credit and its types.pptx
Commercial credit and its types.pptx
DaveN31
 
ACCOUNTING FOR OH.pptx
ACCOUNTING FOR OH.pptxACCOUNTING FOR OH.pptx
ACCOUNTING FOR OH.pptx
DaveN31
 
ACCOUNTING FOR MATERIAL.pptx
ACCOUNTING FOR MATERIAL.pptxACCOUNTING FOR MATERIAL.pptx
ACCOUNTING FOR MATERIAL.pptx
DaveN31
 
CHAPTER ONE(B)- FORMS OF BUSINESS ORGANISATIONS.ppt
CHAPTER ONE(B)- FORMS OF BUSINESS ORGANISATIONS.pptCHAPTER ONE(B)- FORMS OF BUSINESS ORGANISATIONS.ppt
CHAPTER ONE(B)- FORMS OF BUSINESS ORGANISATIONS.ppt
DaveN31
 
FIA 1.pptx
FIA 1.pptxFIA 1.pptx
FIA 1.pptx
DaveN31
 
CHAPTER 3-ECONOMIC ENVIRONMENT.ppt
CHAPTER 3-ECONOMIC ENVIRONMENT.pptCHAPTER 3-ECONOMIC ENVIRONMENT.ppt
CHAPTER 3-ECONOMIC ENVIRONMENT.ppt
DaveN31
 

More from DaveN31 (7)

Digital signature.pptx
Digital signature.pptxDigital signature.pptx
Digital signature.pptx
 
Commercial credit and its types.pptx
Commercial credit and its types.pptxCommercial credit and its types.pptx
Commercial credit and its types.pptx
 
ACCOUNTING FOR OH.pptx
ACCOUNTING FOR OH.pptxACCOUNTING FOR OH.pptx
ACCOUNTING FOR OH.pptx
 
ACCOUNTING FOR MATERIAL.pptx
ACCOUNTING FOR MATERIAL.pptxACCOUNTING FOR MATERIAL.pptx
ACCOUNTING FOR MATERIAL.pptx
 
CHAPTER ONE(B)- FORMS OF BUSINESS ORGANISATIONS.ppt
CHAPTER ONE(B)- FORMS OF BUSINESS ORGANISATIONS.pptCHAPTER ONE(B)- FORMS OF BUSINESS ORGANISATIONS.ppt
CHAPTER ONE(B)- FORMS OF BUSINESS ORGANISATIONS.ppt
 
FIA 1.pptx
FIA 1.pptxFIA 1.pptx
FIA 1.pptx
 
CHAPTER 3-ECONOMIC ENVIRONMENT.ppt
CHAPTER 3-ECONOMIC ENVIRONMENT.pptCHAPTER 3-ECONOMIC ENVIRONMENT.ppt
CHAPTER 3-ECONOMIC ENVIRONMENT.ppt
 

Recently uploaded

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 

Recently uploaded (20)

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 

Computer system security and control-2.pptx

  • 2. Information security is the protection of computer systems and networks from theft or damage to the hardware, software or electronic data as well as from the disruption or misdirection of the services they provide.
  • 3. Objectives of information security It focuses on three goals: 1. Confidentiality: preventing the disclosure of information to unauthorized users. 2. Data integrity : ensuring the accuracy and authenticity of data. Only authorized persons may edit data and they need to follow procedures to prevent former employees from retaining the ability to alter company data
  • 4. 3. Availability: authorised users should have reliable access to information when they need it TYPES OF INFORMATION SECURITY 1. Application security Involves protecting software applications by preventing, detecting and fixing bugs and vulnerabilities
  • 5. 2. Cloud security Involves protections of data, applications and infrastructures involved in cloud computing 3. Cryptography Covers a lot of techniques for communicating in a secure manner
  • 6. 4. Infrastructure security Eg data centers, internal and external networks, desktops
  • 7. Reasons why computer systems are vulnerable Increased access to the system Disgruntled/dishonest employees Increased system complexity Cyber terrorism/crime on the internet or hackers Complacent management Modern networked systems
  • 9. Accidental threats Human errors Procedural errors Software errors Electromechanical problems
  • 10. International breaches of security Theft Terrorism Computer viruses Unauthorized disclosure or access, modification or destruction or loss of data or information Computer fraud
  • 11. General controls Physical control Access controls or logical controls eg passwords, biometric identification techniques Back up Administrative controls
  • 12. Types of Application controls Input controls: are computer controls designed to provide reasonable assurance that transactions are properly authorized before processed by the computer, incorrect transactions are rejected. Processing controls: provide an automated means to ensure processing is complete, accurate and authorized. Output controls: address what is done with data and should compare output results with the intended result by checking the output against the input
  • 13. Internet and E-commerce challenges Viruses: Is a malicious piece of computer code designed to spread from device to device. Viruses are designed to damage a device or steal data Hackers: A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network Spamming: The use of messaging systems to send multiple unsolicited messages to large numbers of recipients for the purpose of commercial advertising or for any prohibited purpose
  • 14. E-commerce controls Firewall: firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Encryption: is the process of encoding information, that is the process converts the original representation of the information known as plain text into an alternative form known as cipher text. Only authorized parties can decipher a cipher text back to plaintext and access the original information.
  • 15. Digital signature: is a mathematical technique used to validate the authenticity and integrity of message ,software or digital document. Digital signatures are based on public key cryptography and private key cryptography Authentication : uses password or any biometric technique